Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-40587: CWE-613: Insufficient Session Expiration in blueprintue blueprintue-self-hosted-edition

0
Medium
VulnerabilityCVE-2026-40587cvecve-2026-40587cwe-613
Published: Tue Apr 21 2026 (04/21/2026, 17:11:23 UTC)
Source: CVE Database V5
Vendor/Project: blueprintue
Product: blueprintue-self-hosted-edition

Description

CVE-2026-40587 is a medium severity vulnerability in blueprintue-self-hosted-edition versions prior to 4. 2. 0. The issue involves insufficient session expiration: when a user changes or resets their password, existing authenticated sessions remain valid and are not invalidated. This allows an attacker who has compromised a session to maintain access to the account until the session naturally expires, even after the password change. The vulnerability is fixed in version 4. 2. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/21/2026, 18:01:39 UTC

Technical Analysis

The blueprintue-self-hosted-edition before version 4.2.0 does not invalidate active sessions when a user changes or resets their password. The server-side session store maps userID to sessions, but the password update process only modifies the password field in the users table without destroying or marking existing sessions invalid. Consequently, an attacker with a compromised session can retain access until the session expires, which by default can be up to 24 hours or persist until browser close depending on configuration. This is classified as CWE-613 (Insufficient Session Expiration). The vulnerability has a CVSS 3.1 score of 6.5 (medium severity).

Potential Impact

An attacker who has already compromised a session can maintain unauthorized access to the affected user's account even after the legitimate user changes or resets their password. This undermines the effectiveness of password changes as a remediation step and can lead to prolonged unauthorized access. The impact affects confidentiality and integrity but does not affect availability.

Mitigation Recommendations

Upgrade blueprintue-self-hosted-edition to version 4.2.0 or later, where this vulnerability is fixed by properly invalidating existing sessions upon password change or reset. Patch status is not explicitly stated but the fix is included in version 4.2.0. Until upgraded, users should be aware that password changes do not revoke active sessions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-04-14T13:24:29.476Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69e7b7ed19fe3cd2cdec7cc5

Added to database: 4/21/2026, 5:46:21 PM

Last enriched: 4/21/2026, 6:01:39 PM

Last updated: 4/21/2026, 7:57:37 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses